Ping Identity Platform and CyberArk Certificate Manager both aim to provide exceptional security and access management. CyberArk Certificate Manager shines with advanced certificate management and higher user satisfaction, while Ping Identity Platform offers better pricing and support advantages.
Features: Ping Identity Platform is notable for its multi-factor authentication, single sign-on capabilities, and adaptable access security, catering to various environments. CyberArk Certificate Manager emphasizes automation of the digital certificate lifecycle, with strong capabilities in certificate discovery, issuance, and management, designed for enterprises seeking comprehensive control over their digital certificates.
Room for Improvement: Ping Identity Platform could enhance its certificate management features, deeper integrations beyond traditional environments, and offer more sophisticated enterprise-level capabilities. CyberArk Certificate Manager can benefit from simplifying its deployment for quicker integration, reducing the complexity of its interface, and providing more cost-effective solutions for organizations with smaller budgets.
Ease of Deployment and Customer Service: CyberArk Certificate Manager's deployment process is more complex due to its enterprise-level features, but its customer service is highly supportive. Ping Identity Platform provides a smoother setup thanks to its user-friendly process and extensive resources, requiring less hands-on time from clients during deployment.
Pricing and ROI: Ping Identity Platform typically involves a lower initial setup cost, delivering favorable ROI through efficient operational management. In contrast, CyberArk Certificate Manager requires a higher initial investment for its specialized services, which is justified over time by its extensive features, appealing to those focused on robust certificate management despite the upfront cost.
With Venafi, it wasn't about saving time but achieving functionality that was otherwise impossible, such as distributing certificates without manual intervention.
Inquiries are typically addressed the same day, with most issues, even complex ones, resolved within 24 hours.
Venafi's technical support is excellent, with even their first-tier support being in-house and highly competent.
Their technical support is knowledgeable and helpful, making Venafi stand out among other CyberArk products.
I have reached out to technical support for troubleshooting SAML certificate mismatches and federated errors between Ping and enterprise apps.
This role-based access control enhances scalability and efficiency by providing a focused view of necessary information.
Horizontal scaling is a necessity rather than vertical scaling.
Scalability with Venafi is good; you can definitely use it if you have ten thousand certs, a thousand certs, a million, or a couple million.
Venafi's stability has been consistently reliable.
Venafi is a stable product. It's definitely more stable than others.
For stability, I'd rate it around six out of ten since we experience some outages despite the investment.
Expanding the range of out-of-the-box integrations would significantly improve the user experience.
The yearly DNS verification required by certificate authorities necessitates manual intervention, hindering full automation.
They are pushing for cloud adoption, but we prefer on-premises solutions due to regulatory concerns.
I would like to enable ServiceNow Generative AI for auto-diagnosing PingFederate SSO failures and suggest remediation steps.
Venafi offers good value for the cost.
The pricing has increased for us, impacting our organization due to its operational expenditure (OPEX).
For our budget, Venafi's cost is moderate. It's not expensive as internal certificate generation is free, and we only pay for the public CA certificate signer and for storage in Venafi.
The most valuable feature of Venafi is the automation that helps save time and reduce human error.
It ensures centralized certificate management, which is crucial for compliance and maintaining best practices.
What I like best about Venafi is that it's very easy to get somebody on a call and get any of my questions answered.
The platform enhances security measures by analyzing multi-factor authentication attempts, highlighting suspicious patterns, and generating compliance reports.
Product | Market Share (%) |
---|---|
Ping Identity Platform | 4.0% |
Venafi | 1.3% |
Other | 94.7% |
Company Size | Count |
---|---|
Small Business | 5 |
Large Enterprise | 10 |
Company Size | Count |
---|---|
Small Business | 8 |
Midsize Enterprise | 2 |
Large Enterprise | 20 |
CyberArk Certificate Manager automates and streamlines certificate processes, reducing errors and enhancing efficiency. It centralizes management, supports compliance, and improves certificate lifecycle management with customizable features.
CyberArk Certificate Manager offers a streamlined approach to managing certificates, focusing on automation that minimizes manual intervention and errors. Its discovery and centralized management enhance operational efficiency, while integration capabilities facilitate seamless handling of certificates across systems like AWS and Azure. Users benefit from its user-friendly, intuitive interface, robust reporting, and customizable notifications, which improve compliance, reduce bottlenecks, and allow for custom field creation. Though the on-premises version is mature, there is room for improvement in cloud service integration and out-of-the-box features. Additional enhancements are needed in documentation clarity, hardware security module support, and diverse scripting language support.
What are the most important features of CyberArk Certificate Manager?CyberArk Certificate Manager finds applications across multiple industries like finance and healthcare where stringent security protocols are critical. Organizations use it for server authentication and managing application IDs, ensuring compliance and preventing outages. Its integration with major cloud platforms and automation of installations across endpoints makes it an ideal choice for companies focusing on enhancing security and operational efficiency.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.